Describe the issues that impact network functionality (e.g., bandwidth, load, delay, topology).
Compare ways software developers protect devices and information from unauthorized access.
Evaluate the scalability and reliability of networks, by describing the relationship between routers, switches, servers, topology, and addressing.
Give examples to illustrate how sensitive data can be affected by malware and other attacks.
Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
Compare various security measures, considering tradeoffs between the usability and security of a computing system.
Explain tradeoffs when selecting and implementing cybersecurity recommendations.
Model the role of protocols in transmitting data across networks and the Internet.